beautypg.com

Authorized managers – GarrettCom MNS-6K 4.1.4 User Manual

Page 103

background image

M A G N U M 6 K S W I T C H E S , M N S - 6 K U S E R G U I D E

attempts. This provides a chronological entry of all intrusions attempted on a specific
port.

The event log records events as single-line entries listed in chronological order, and serves
as a tool for isolating problems. Each event log entry is composed of four fields
Severity – the level of severity (see below)
Date – date the event occurred on. See Chapter 3 on setting the

date and time

on the

switch
Time – time the event occurred on. See Chapter 3 on setting the

date and time

on the

switch
Log Description – description of event as detected by the switch

Severity

is one of 8 severities described at the beginning of this section.

Authorized managers

This feature is available in MNS-6K-SECURE.

Just as port security allows and disallows specific MAC addresses from accessing a
network, the MNS-6K software can allow or block specific IP addresses or a range of IP
addresses to access the switch. The command used for that is

Syntax access – access configuration mode
Syntax allow ip= mask= service= - authorize

managers

Syntax deny ip= mask= service= - deny access

to a specific IP address(s) or a subnet

Syntax remove ip= mask= - remove specific IP address(s) or

subnet

Syntax removeall - remove all managers

Syntax show ip-access – display list of authorized managers

access – context are the access commands
allow – allow specified services for specified IP addresses – IP addresses can be individual

stations, a group of stations or subnets. The range is determined by the IP address and
netmask settings

102

This manual is related to the following products: